IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed    Add to Google    Add to My Yahoo!
Presidential Decision Directive 63 White Papers (View All Report Types)
 
Intelligence-driven GRC for Security
sponsored by RSA
WHITE PAPER: Discover how a comprehensive, intelligence-driven GRC model extends visibility into data and processes, provides in-depth analysis of risks and compliance issues, and allows businesses to anticipate, respond and continuously adapt in a rapidly changing landscape.
Posted: 06 May 2015 | Published: 06 May 2015

RSA

Infographic: Statistics for Cyber Security
sponsored by IBM
WHITE PAPER: This infographic helps you learn what you're up against by giving you some numbers and statistics behind the growing problem of cybercrime.
Posted: 27 May 2015 | Published: 31 Dec 2014

IBM

Leadership Compass: Surveying Access Governance Options
sponsored by Dell Software
WHITE PAPER: The Access Governance vendor landscape is growing. Find out who leads in innovation, product features and market reach.
Posted: 12 May 2015 | Published: 12 May 2015

TOPICS:  IT Management
Dell Software

The Forrester Waveâ„¢: North American ITSM Implementation Services Providers,Q2 2014
sponsored by Unisys
WHITE PAPER: View this informative report, issued by Forrester, that helps firms select the most appropriate ITSM implementation services provider.
Posted: 06 May 2015 | Published: 30 Jun 2014

Unisys

3 Steps to a Better Team of Architects, Developers and DBAs
sponsored by Dell Software
WHITE PAPER: Your data pros have a huge impact on your entire organization. Learn how to enable world-class collaboration among them.
Posted: 12 May 2015 | Published: 12 May 2015

TOPICS:  IT Management
Dell Software

SCB Builds a Defense Against Malware
sponsored by Malwarebytes Corporation
WHITE PAPER: In this case study, learn the story of an architectural firm that dramatically decreased malware attacks while increasing productivity.
Posted: 08 May 2015 | Published: 08 May 2015


Android for Work: Top 8 Security Considerations Every CISO Should Know
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how Android for Work and the Lollipop, the latest version of the Android OS, are cleaning up your most feared security concerns.
Posted: 14 May 2015 | Published: 14 May 2015

MobileIron

Custom Defense Against Targeted Attacks
sponsored by Trend Micro
WHITE PAPER: Read this white paper to discover how you can build custom-designed security that can withstand even the most advanced targeted attack.
Posted: 08 May 2015 | Published: 31 Dec 2014

Trend Micro

The Current State of Server Security Affairs
sponsored by Trend Micro
WHITE PAPER: Access this white paper for an in-depth examination of the current state of server security.
Posted: 27 May 2015 | Published: 26 Dec 2014

Trend Micro

15 SIEM Systems Evaluated for 3 Use Cases
sponsored by IBM
WHITE PAPER: This Gartner report evaluates fifteen SIEM systems according to three different use cases and reveals the specialized capabilities of each.
Posted: 26 May 2015 | Published: 25 Jun 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement